5cbe41b12f
The bcc command line uses /data/user/0 paths, so renderscript needs to be able to follow those symlinks. Addresses the following denial: audit(1545249938.830:2274): avc: denied { read } for comm="bcc" name="0" dev="dm-6" ino=101 scontext=u:r:rs:s0:c184,c256,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=lnk_file permissive=1 app=android.rscpp.cts Test: cts-tradefed run cts -m CtsRsCppTestCases Bug: 121266184 Bug: 112357170 Change-Id: I16210f9b95f386bdee0863cf0044c956af99586d
45 lines
1.5 KiB
Text
45 lines
1.5 KiB
Text
type rs, domain, coredomain;
|
|
type rs_exec, system_file_type, exec_type, file_type;
|
|
|
|
# Any files which would have been created as app_data_file
|
|
# will be created as rs_data_file instead.
|
|
allow rs app_data_file:dir ra_dir_perms;
|
|
allow rs rs_data_file:file create_file_perms;
|
|
type_transition rs app_data_file:file rs_data_file;
|
|
|
|
# Follow /data/user/0 symlink
|
|
allow rs system_data_file:lnk_file read;
|
|
|
|
# Read files from the app home directory.
|
|
allow rs app_data_file:file r_file_perms;
|
|
allow rs app_data_file:dir r_dir_perms;
|
|
|
|
# Cleanup rs_data_file files in the app home directory.
|
|
allow rs app_data_file:dir remove_name;
|
|
|
|
# Use vendor resources
|
|
allow rs vendor_file:dir r_dir_perms;
|
|
r_dir_file(rs, vendor_overlay_file)
|
|
r_dir_file(rs, vendor_app_file)
|
|
|
|
# Read contents of app apks
|
|
r_dir_file(rs, apk_data_file)
|
|
|
|
allow rs gpu_device:chr_file rw_file_perms;
|
|
allow rs ion_device:chr_file r_file_perms;
|
|
allow rs same_process_hal_file:file { r_file_perms execute };
|
|
|
|
# File descriptors passed from app to renderscript
|
|
allow rs untrusted_app_all:fd use;
|
|
|
|
# TODO: Explain why these dontaudits are needed. Most likely
|
|
# these are file descriptors leaking across an exec() boundary
|
|
# due to a missing O_CLOEXEC / SOCK_CLOEXEC
|
|
dontaudit rs untrusted_app_all:unix_stream_socket { read write };
|
|
dontaudit rs untrusted_app_all:fifo_file { read write };
|
|
|
|
# TODO: Explain why this is necessary. I think this is a zygote
|
|
# created logging socket and system server parceled file descriptor
|
|
# which is not using the O_CLOEXEC flag.
|
|
dontaudit rs zygote:fd use;
|
|
dontaudit rs system_server:fd use;
|